Certified Secure Computer User

About the Course

Hundreds of millions of people globally harness the power of the web, email and computer applications daily. They fill the offices, halls of academia and very much run the wheels of global economics. Computer users need to know how to protect information assets and securely connect to another system over a network. CSCU program enables them to build on their existing skills and achieve better efficiency in using computer resources by educating them on practical aspects of security and networking. CSCU is about empowering the knowledge worker with information necessary to compute securely, network efficiently and be in control of the computing environment.

CSCU delivers computer security to individuals who use computer and internet at home, school and office. The purpose of CSCU program is to provide the students with the knowledge and necessary skills to guard information assets. This class will immerse the student in an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attack and social engineering.

Are you prepared to face them and defend yourself? Secure yourself with CSCU training. Take control and remain in control of your information resources.

Expected Course Outcomes

By the end of the course, trainees will be able to:

Understand what data is and the difference between data and information,what data security is and the risk involved in breach of data compromises.

Identify different forms of malware, symptoms of infection and how to choose the right antivirus.

Knowing the threats web browsers pose and basic security measures to take when online

Understand social networking and geotagging, the risks involved and how to avoid those risks.

Identify various threats accompanied by emailing and the emailing security measures

Know the risks the mobile device is exposed to, the basics of mobile security and its importance

Understand the different types of clouds available, their differences and their advantages

Understand the importance and need for data backup and the different types of data backups

Upon successful completion of the course, each trainee will be certified as an Accredited Certified Secure Computer User

Course Summary

Introduction to Security

Securing Operating Systems

Malware and Antivirus

Internet Security

Security on Social Networking Sites

Securing Email Communications

Securing Mobile Devices

Securing the Cloud

Securing Network Connections

Data Backup and Disaster Recovery

Course Duration

The course duration is 16 hours

Target audience

Office knowledge workers, home users and anyone who wants to gain a working knowledge of computer and network security.

About the Course

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on the latest security threats, advanced attack vectors and practical, real time demonstration of lack of latest hacking techniques, methodologies tools, tricks and security measures. Unlike other theoretical trainings, you will be immersed interactive sessions and the will be a hands-on lab. You can explore the newly gained knowledge right away in your classroom by trying to test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience of the current essential security systems.